BibTeX records: Thomas Fuhr 0001

download as .bib file

@article{DBLP:journals/joc/Chaigneau0GJR19,
  author       = {Colin Chaigneau and
                  Thomas Fuhr and
                  Henri Gilbert and
                  J{\'{e}}r{\'{e}}my Jean and
                  Jean{-}Ren{\'{e}} Reinhard},
  title        = {Cryptanalysis of {NORX} v2.0},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {4},
  pages        = {1423--1447},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9297-9},
  doi          = {10.1007/S00145-018-9297-9},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Chaigneau0GJR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChaigneauFGGJRS18,
  author       = {Colin Chaigneau and
                  Thomas Fuhr and
                  Henri Gilbert and
                  Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Jean{-}Ren{\'{e}} Reinhard and
                  Ling Song},
  title        = {Key-Recovery Attacks on Full Kravatte},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {5--28},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.5-28},
  doi          = {10.13154/TOSC.V2018.I1.5-28},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/ChaigneauFGGJRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/FuhrNR18,
  author       = {Thomas Fuhr and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Yann Rotella},
  title        = {State-Recovery Attacks on Modified Ketje Jr},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {29--56},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.29-56},
  doi          = {10.13154/TOSC.V2018.I1.29-56},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/FuhrNR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChaigneauFGJR17,
  author       = {Colin Chaigneau and
                  Thomas Fuhr and
                  Henri Gilbert and
                  J{\'{e}}r{\'{e}}my Jean and
                  Jean{-}Ren{\'{e}} Reinhard},
  title        = {Cryptanalysis of {NORX} v2.0},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {156--174},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.156-174},
  doi          = {10.13154/TOSC.V2017.I1.156-174},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ChaigneauFGJR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FuhrLS15,
  author       = {Thomas Fuhr and
                  Ga{\"{e}}tan Leurent and
                  Valentin Suder},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {Collision Attacks Against {CAESAR} Candidates - Forgery and Key-Recovery
                  Against {AEZ} and Marble},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9453},
  pages        = {510--532},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48800-3\_21},
  doi          = {10.1007/978-3-662-48800-3\_21},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/FuhrLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuhrLS15,
  author       = {Thomas Fuhr and
                  Ga{\"{e}}tan Leurent and
                  Valentin Suder},
  title        = {Collision Attacks against {CAESAR} Candidates - Forgery and Key-Recovery
                  against {AEZ} and Marble},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1193},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1193},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuhrLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/FuhrM14,
  author       = {Thomas Fuhr and
                  Brice Minaud},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Match Box Meet-in-the-Middle Attack Against {KATAN}},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {61--81},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_4},
  doi          = {10.1007/978-3-662-46706-0\_4},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/FuhrM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Canteaut0GNR14,
  author       = {Anne Canteaut and
                  Thomas Fuhr and
                  Henri Gilbert and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Jean{-}Ren{\'{e}} Reinhard},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Multiple Differential Cryptanalysis of Round-Reduced {PRINCE}},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {591--610},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_30},
  doi          = {10.1007/978-3-662-46706-0\_30},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Canteaut0GNR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanteautFGNR14,
  author       = {Anne Canteaut and
                  Thomas Fuhr and
                  Henri Gilbert and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Jean{-}Ren{\'{e}} Reinhard},
  title        = {Multiple Di fferential Cryptanalysis of Round-Reduced {PRINCE} (Full
                  version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {89},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/089},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanteautFGNR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/FuhrJLT13,
  author       = {Thomas Fuhr and
                  {\'{E}}liane Jaulmes and
                  Victor Lomn{\'{e}} and
                  Adrian Thillard},
  editor       = {Wieland Fischer and
                  J{\"{o}}rn{-}Marc Schmidt},
  title        = {Fault Attacks on {AES} with Faulty Ciphertexts Only},
  booktitle    = {2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, Los
                  Alamitos, CA, USA, August 20, 2013},
  pages        = {108--118},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/FDTC.2013.18},
  doi          = {10.1109/FDTC.2013.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/FuhrJLT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanteautFNPRV12,
  author       = {Anne Canteaut and
                  Thomas Fuhr and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Pascal Paillier and
                  Jean{-}Ren{\'{e}} Reinhard and
                  Marion Videau},
  title        = {A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based
                  Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {363},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/363},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanteautFNPRV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/FuhrGRV11,
  author       = {Thomas Fuhr and
                  Henri Gilbert and
                  Jean{-}Ren{\'{e}} Reinhard and
                  Marion Videau},
  editor       = {Ali Miri and
                  Serge Vaudenay},
  title        = {Analysis of the Initial and Modified Versions of the Candidate 3GPP
                  Integrity Algorithm 128-EIA3},
  booktitle    = {Selected Areas in Cryptography - 18th International Workshop, {SAC}
                  2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7118},
  pages        = {230--242},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-28496-0\_14},
  doi          = {10.1007/978-3-642-28496-0\_14},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/FuhrGRV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Fuhr10,
  author       = {Thomas Fuhr},
  editor       = {Masayuki Abe},
  title        = {Finding Second Preimages of Short Messages for Hamsi-256},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 5-9, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6477},
  pages        = {20--37},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17373-8\_2},
  doi          = {10.1007/978-3-642-17373-8\_2},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Fuhr10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuhrGRV10,
  author       = {Thomas Fuhr and
                  Henri Gilbert and
                  Jean{-}Ren{\'{e}} Reinhard and
                  Marion Videau},
  title        = {A Forgery Attack on the Candidate {LTE} Integrity Algorithm 128-EIA3},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {618},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/618},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuhrGRV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/FuhrP09,
  author       = {Thomas Fuhr and
                  Thomas Peyrin},
  editor       = {Orr Dunkelman},
  title        = {Cryptanalysis of RadioGat{\'{u}}n},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {122--138},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_8},
  doi          = {10.1007/978-3-642-03317-9\_8},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/FuhrP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BressonCCCFGIMNPPRTV09,
  author       = {Emmanuel Bresson and
                  Anne Canteaut and
                  Beno{\^{\i}}t Chevallier{-}Mames and
                  Christophe Clavier and
                  Thomas Fuhr and
                  Aline Gouget and
                  Thomas Icart and
                  Jean{-}Fran{\c{c}}ois Misarsky and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Pascal Paillier and
                  Thomas Pornin and
                  Jean{-}Ren{\'{e}} Reinhard and
                  C{\'{e}}line Thuillet and
                  Marion Videau},
  title        = {Indifferentiability with Distinguishers: Why Shabal Does Not Require
                  Ideal Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {199},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/199},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BressonCCCFGIMNPPRTV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuhrP08,
  author       = {Thomas Fuhr and
                  Thomas Peyrin},
  title        = {Cryptanalysis of RadioGatun},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {515},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/515},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuhrP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/FuhrP07,
  author       = {Thomas Fuhr and
                  Pascal Paillier},
  editor       = {Willy Susilo and
                  Joseph K. Liu and
                  Yi Mu},
  title        = {Decryptable Searchable Encryption},
  booktitle    = {Provable Security, First International Conference, ProvSec 2007, Wollongong,
                  Australia, November 1-2, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4784},
  pages        = {228--236},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75670-5\_17},
  doi          = {10.1007/978-3-540-75670-5\_17},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/FuhrP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics